Static task
static1
Behavioral task
behavioral1
Sample
0a7214b1c619171bb256d8bcabf79708.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0a7214b1c619171bb256d8bcabf79708.dll
Resource
win10v2004-20231215-en
General
-
Target
0a7214b1c619171bb256d8bcabf79708
-
Size
124KB
-
MD5
0a7214b1c619171bb256d8bcabf79708
-
SHA1
ebbc5c2932ae3ea7754065536d79f7e2b8e89079
-
SHA256
1c85d44aed37061d4d4a142cbf81c7fc03d1ce8d011dd5e9b9a9d3c58e4618c0
-
SHA512
086f0442b5dab56e958542d360371a9ed89c9e1ba3c66be9213dd51c0315392ff63ff994b31a66ce21b16cfc892dd0b2ac4abe1a66cccb9bf84f5f7964957e09
-
SSDEEP
384:aIQe0/ntMj5NJqSGdEnirxWc5PQDbDyg2XVGlyoBvtmOI6:KeantUPCGnixWcdQDbYpmvhz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0a7214b1c619171bb256d8bcabf79708
Files
-
0a7214b1c619171bb256d8bcabf79708.dll windows:4 windows x86 arch:x86
f7cf3b67b3a821d0559b82fba303fea6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
OpenProcess
ExitProcess
ResumeThread
WriteProcessMemory
VirtualProtectEx
GetModuleFileNameA
GetProcAddress
ReadProcessMemory
GetCurrentProcess
GetModuleHandleA
GetCurrentThreadId
DisableThreadLibraryCalls
RaiseException
InitializeCriticalSection
GetPrivateProfileStringA
WideCharToMultiByte
TerminateProcess
EnterCriticalSection
LoadLibraryA
SetThreadContext
OpenThread
SetUnhandledExceptionFilter
CloseHandle
Process32Next
Process32First
CreateToolhelp32Snapshot
GetTickCount
GetCurrentProcessId
CreateMutexA
GetLastError
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
LeaveCriticalSection
CreateThread
user32
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
GetForegroundWindow
GetWindowTextA
FindWindowA
GetWindowThreadProcessId
GetKeyState
imagehlp
ImageUnload
ImageLoad
shlwapi
PathFileExistsA
msvcrt
fread
fopen
free
_initterm
malloc
_adjust_fdiv
_stricmp
_strlwr
fclose
strstr
wcslen
strcmp
strncpy
??2@YAPAXI@Z
memcpy
strrchr
memset
strcat
sprintf
strcpy
strlen
rand
srand
wininet
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
Sections
.text Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ